Public Key Infrastructure - Research Paper Example

Comments (0) Cite this document
The management is convinced to implement Public Key Infrastructure (PKI) as a framework to ensure integrity, confidentiality,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Public Key Infrastructure
Read TextPreview

Extract of sample "Public Key Infrastructure"

Public Key Infrastructure Case Overview The organization is presently using a Microsoft Server Active Directory domain which is administered bya team of information security. The management is convinced to implement Public Key Infrastructure (PKI) as a framework to ensure integrity, confidentiality, nonrepudiation and authentication in their operation. Subsequently, the company would be using digital certificate to sign software to demonstrate authenticity of software to their clients. With this regard the study focuses on analyzing the fundamentals of PKI and their application in order to ensure quality resources within the organization.
PKI is set of complex set of application that supports other application system and components that will assist in building a network security. Implementation of PKI is anticipated to serve as an essential component of an overall security system within the organization (Zao, 2012; Hanka et al., 2011). PKI is highly scalable and helps the in maintaining certificates with their unique identity. A feature of PKI such as scalability further creates no requirement of third party authentication. Through the feature of the delegation of trust the software enhances the authentication of the software within the end users. To enhance the security system within an organization the PKI provides unique codes and ensures that only legitimate users are able to access to the system resources. These features of PKI along with identity based self-certified keys are anticipated to ensure better security system controlled within the organization (The Saylor Foundation, 2012).
PKI system allows the use of mathematically related key pairs, to be used for public and private level. The private key is used to safeguard the requirement of the privacy at the organizational level. Correspondingly, the public keys provide a unique identification to the users of the software. This method of encryption and decryption is further observed to help the organization to authenticate the software and enhances the credibility to the customers (United States Department of Agriculture, n.d.).
The certificate authority helps in creating and binding the public encryption keys. The in-house certification authority enhances the maximum level of control over the different software being used within an organization. The process employs a digital sign which enhances the financial soundness, liability protection as well as enhances the corroboration of transaction. The document that is signed by a trusted b y a third party organization is referred to as a public Certificate Authority (CA). The in-house CA has been the most trusted type of the security system but are also very costly at the same time. The public CA is based on the policy module depended on the predefined list of certificate extensions. However, by sharing of the certificate encryption among the public CAs increases its vulnerability and enhances the chances of being hacked. On the other hand the public CA enhances the security of the public websites and in turn enhances the transparency of the data reducing their vulnerability. This helps the organization to increase their security system and also ensures their development of the certificate authority by reducing vulnerabilities related to security aspect (Preneel, 2011). Based on the above stated factors, it is proposed to the organization to use public CA as it is less costly while it is also effective enough to guarantee adequate security (Hanka et al., 2011).
The organization should be implementing the PKI in order to reduce the any possible security threats within the organization. Moreover by implementing the PKI, the organization will be able to increase their integrity and credibility that would facilitate it to acquire the greater confidence of the end users. By issuing the digital certificates the company will be able to ensure their authentication and non-repudiation at a larger extent.
Hanka, O., Eichhorn, M., Pfannenstein, M., Eberspacher, J. & Steinbach, E. (2011). A distributed public key infrastructure based on threshold cryptography for the Hiimap next generation internet architecture. Future Internet, 3, 1-5.
Preneel, B. (2011). Public key infrastructure fundamentals. Katholieke Universiteit Leuven, 1-30.
The Saylor Foundation. (2012). Public key infrastructure. Retrieved from
United States Department of Agriculture. (2013). Use of public key infrastructure (PKI). Retrieved from
Zao, J. K. (2012). Public key infrastructure (PKI). Computer Science Department, 1-17. Read More
Cite this document
  • APA
  • MLA
(“Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from
(Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 Words)
Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 Words.
“Public Key Infrastructure Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Public Key Infrastructure

Key Performance Indicators in Public Procurement Agencies

...?Eco-Friendly Key Performance Indicators in Public Procurement Research Thesis Proposal [27 February ECO-FRIENDLY KEY PERFORMANCE INDICATORS INPUBLIC PROCUREMENT The fundamental purpose of procurement is to acquire appropriate utility?goods and services for various types of necessities. Today, the social enterprises and organizations are accustomed to the trade concepts. Their procurement process largely depends upon contracts of delivery. Such services help the community and public sector consumers and users. In simple words public procurement means the purchase of goods or services in public domain. Nowadays public procurement system is one of the highly sensitive financial issues. Until the end of nineteenth century procurement... ,...
7 Pages(1750 words)Thesis Proposal

Public Health infrastructure

...? Public Health Infrastructure Public Health Infrastructure Organizations like the National Institute of Healthand many other funding agencies have already taken initiative for enhancing diversity in the health care deliverance system and biomedical research to combat the epidemic of the millennium, HIV/Aids. Although these programs have improved the research infrastructure in strengthening the faculties of institutions, the severity of the spread demands rather comprehensive efforts to address the issue. To illustrate, the situation with regard to HIV/AIDS demands shaping an efficient infrastructure for dealing with the public health problems in the long run. No single effort toward the infrastructural development can undermine... the...
2 Pages(500 words)Research Paper

Public Infrastructure Services

...Infrastructure Application and Review ID 19714 Order No. 262508 14 December 2008 Acknowledgements Table of Contents: List of Figures: Figure No. Figure Description Figure 1 Well Being of citizens and corresponding Physical & Mental Health & Safety of the citizens of a Country Figure 2 Percentage Capital Outlay on Public Infrastructure (Source: Report to Congress by US Department of Transportation, Federal Highway Administration and Federal Transit Administration. The Secretary... of Transportation. 2006) Figure 3 Percentage of Public Funding for Transit Infrastructure (Source: Report to Congress by US Department of Transportation, Federal Highway Administration and Federal...
10 Pages(2500 words)Essay

Public Infrastructure

...) Figure 4 Greenhouse Gas Emissions from different forms of Transport (Source: Introduction: The health of a country is determined by the health of its people. The Public Infrastructure facilities and transport system are deployed by the people for the people of a country. Hence, the primary consideration in the design and implementation of Infrastructure facilities and Transport system should be the health and safety of people. From the perspective of Infrastructure & transport planning Health is not only about deploying adequate hospitals and access to medication. Similarly, safety is not only about reducing hazards...
14 Pages(3500 words)Essay

Assignment HS315: Critical Infrastructure & Key Resource Protection

...Dam sector Overview and history of the sector The dam section is composed of navigation blocks, dam projects, levees, mine tailings, control facilities, same water retention and hurricane barriers. Dams are very important to a country’s infrastructure and it provides a wide array of social, environmental and economic benefits, inclusive of river navigation, hydroelectric power, recreation, flood control and water supply. United states have more than 81,000 dams; roughly 65% are owned privately and 85% regulated by safety offices of the state dam. The sector works under the patronage of CIPAC framework. It comprises of a coordinating council sector and GCC which is Government Coordinating Council (Critical...
1 Pages(250 words)Assignment

Report on Public Key Encryption

...Public Key Encryption The world has become electronic in almost all its activities. Therefore, there is need to provide an identifier for online users. As a result, the public key encryption provides an identity to the world. This mainly affects those who seek to find data or information online. Moreover, technology needs to be secure to avoid fraudsters from tampering with vital information. Consequently, people need a passport or identification to access online information. However, public key encryption makes use of long numbers. These numbers are known as keys (Ferguson & Schneier, 2003 p18). The process becomes more...
1 Pages(250 words)Assignment

Analyzing the key public of CASA

...Analyzing the Public of CASA Analyzing the Public of CASA CASA is an organization that is formed to advocate for the timely replacement of abused and neglected children into safe and permanent residence and for the utmost quality of their care as they are under the jurisdiction of the court (Carter, 2009). The organization has carefully focused PR plan that is aimed at achieving such goals that includes: Increasing the minority volunteer The main group that is targeted by this goal is the African American males. This is an interesting group that needs to be added to the list of the volunteers as the number of the children that the organization is looking after from the African American community is on the...
2 Pages(500 words)Essay

Public Key Infrastructure

...Public Key Infrastructure Assignment Public Key Infrastructure (PKI) is a type of security architecture that offers a higher level of confidence when it comes to the exchange of information over the internet. The PKI allows for the integration of the various services connected to the concept of cryptography. The main aim behind PKI is to provide access control, integrity, confidentiality, authentication and non-repudiation (El-Ashqar, 2012). PKI is anchored on three main concepts. The first is authentication where strong authentication mechanisms help to verify the users of machines. Secondly, there is the idea of encryption where...
2 Pages(500 words)Case Study

Public Key Infrastructure

...Public Key Infrastructure Affiliation Public key infrastructure Increment of digital interchanges and connections has obliged for a stronger security level to secure the clients and their data transaction. Frameworks, servers, PCs, and cell phones, are all being utilized universally to view communication that is made private. Due to upsurging of information management there is a challenge between the two competitors in the field of information security. That is the hackers and the system developers. Public key infrastructure was developed to control internet framework of communication. A...
3 Pages(750 words)Case Study

Quiz 6: Public Key

...Quiz 6: Public Key QUIZ 6: PUBLIC KEY Private Key is an encryption/ decryption key known to the party or parties thatexchanges messages (In a networking field).Public Key does some designed authority as an encryption key that, combines with a private key derived from a public key can be used to encrypt messages effectively, and digital signatures provide n value (Gaubatz, Kaps, & Sunar,2005). RSA entails a public key algorithm that generates two keys; they allow encryption of the data,...
4 Pages(1000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Public Key Infrastructure for FREE!

Contact Us